1. Trang chủ
  2. » Công Nghệ Thông Tin

Emerging trends of cyber security in segregating approach

5 40 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 5
Dung lượng 0,93 MB

Nội dung

Though there is no technical definition by any statutory body for Cybercrime, it is broadly defined by the Computer Crime Research Centre as - “Crimes committed on the internet using the computer either as a tool or a targeted victim. Cybercrime could also include non-monetary offenses, such as creating and distributing small or large programs written by programmers called viruses on other computers or posting confidential business information on the Internet.

ISSN: 2249-5789 Sandeep Kulkarni, International Journal of Computer Science & Communication Networks,Vol 8(1),1-5 Emerging trends of cyber security in segregating approach Sandeep Kulkarni M Sc(PhD), Department of CSE, Himalayan University Itanagar, Papumpare- 791111, Arunachal Pradesh Abstract Technology is rapidly evolving in a world driven by social networks, online transactions, cloud computing, and automated processes But with the technological evolution comes the progress of cybercrime, which continually develops new attack types, tools and techniques that allow attackers to penetrate more complex or well-controlled environments, and produce increased damage and even remain untraceable IT-security experts engage in behaviour-based malware analysis in order to learn about previously unknown samples of malicious software (malware) or malware families For this, they need to find and categorize suspicious patterns from large collections of execution traces Though there is no technical definition by any statutory body for Cybercrime, it is broadly defined by the Computer Crime Research Centre as - “Crimes committed on the internet using the computer either as a tool or a targeted victim Cybercrime could also include non-monetary offenses, such as creating and distributing small or large programs written by programmers called viruses on other computers or posting confidential business information on the Internet but also a bigger number of attacks defeating the security of extremely large companies, thus affecting the information security, business continuity and customers’ trust Cybercrime issues are related with the problems like security of financial dealings, prohibiting maltreatment of credit card information, providing security for information during online transactions, preserving privacy and confidentiality of e-mails and the attack on privacy This growth has attracted hundreds of online companies to conduct business in the Middle East and allowed many existing sectors, such as education, health, airline, and government, to move their operations online It ends by drawing main counter measures that companies may undertake in order to ensure improvement of controls covering the information integrity and availability Child Grooming Child grooming is activities used to attract minors into deal of illegal businesses such as child prostitution and/or the production of child pornography Child grooming involves INTRODUCTION Developing new ways to gain unauthorized access to networks, programs and data, attackers aim to compromise the confidentiality, integrity and availability of information, building their targets from single individuals to small or medium sized companies and even business giants Every year seems to bring a bigger number of attacks overall, IJCSCN | February-March 2018 Available online@www.ijcscn.com actions purposely take on with the aim of helping and establishing an emotional linking with a child, to lower the Childs inhibitions in order to sexually abuse the child.18 This is a behaviour that is typical have done of an adult who is sexually mostly attracted to children ISSN: 2249-5789 Sandeep Kulkarni, International Journal of Computer Science & Communication Networks,Vol 8(1),1-5 Adult may begin the grooming process by The act controls how personal information can enter into social networking sites, at the chat be used either business, organization or rooms pages or interaction children through Government And want responsibilities to audio, video , email and text messages The everyone using data to follow strict rules of technologies in this days are simplify ways for information which must be used fairy and criminal to contact with children through lawfully, limited, specifically stated purposes, internet Children are attracted online because accurate, not keep longer than necessary, must they use computer on networking websites for be safety and secure And legal protection for social website or chat room Criminals use sensitive report like political, religious, health, false identities in chat rooms to attract Child criminal reports and connecting and to be victim in the business of sexual abuse Once this happen a child of online exploitation must live with their exploitation for the all the time of their lives Data Protection Act The Data Protection Act 1998 (DPA) was passed by United Kingdom Parliament This is designed to protect a data stored on computers The aim to handle and control information and give legal rights to those have information stored and how people can be used it The Act set a basic way such as setting European Cybercrime Centre (ECC) rules that can be follow by people and companies that deals to store people information The Act is work by setting rules of Information Commissioner have power to enforce the Acts and Data controller that keep and collects Data about people For example Customer Information The office Information Commissioner apply great role to make sure that society are obey the rules in order to prevent a misuse of Data The establishment Cybercrime Centre of is the European introduce for the development to fight against cybercrime The ECC help the Union member governments, businesses and citizens to have the tools to tackle cybercrime and make the Europe cleverer and stronger in its fight against cybercrime and fast to solve any problem occurred The European Cybercrime will work for as the Centre of European information on IJCSCN | February-March 2018 Available online@www.ijcscn.com ISSN: 2249-5789 Sandeep Kulkarni, International Journal of Computer Science & Communication Networks,Vol 8(1),1-5 cybercrime The centre support investigation, Prevention of Terrorism Act (URT) building capacity to struggle on cybercrime through working out, awareness educating For fighting Terrorism, The Act is applied for providing cybercrime the united republic of Tanzania Its aim is to Moreover, the Centre will build experts protect the country on terrorist The law community for all sectors of society to battle established to prevents terrorist activities and and stop cybercrime and online child sexual a mechanism through which Tanzania can exploitation cooperates The EU, works with EU stakeholders, non EU International in fighting on criminal In this countries, international organizations, internet act specifically talks on terrorism act by governance bodies and service providers, conducting disruption in computer system, companies involved in internet security and communication infrastructure and banking the financial sector, academic experts, civil services society best practice on with Regional countries and organisations, National Computer Emergency Response Teams And forming a safer Communication information around the world by improve and maintain the high security of information infrastructures and combating any computer activities related crimes, the European Union set four principal points must be existing in any cybercrime system or the provision of services directly policy are: The adoption of adequate, substantive, and procedural legislative provisions to deal with both domestic and transnational criminal related to communications banking or financial infrastructure, services, utilities, transportation or other essential infrastructure; Terrorist most of the time organise and activities; The availability of a sufficient number of well-trained and well-equipped law The improvement of the cooperation all stakeholders, operate their criminal successfully due uses of Internet, computer and network system in their communication The law prevent ability of enforcement personnel; between Designed or intended to disrupt any computer users and terrorist to send a money from into or passing through Tanzania as a border consumers, industry, and law enforcement; THE GOMPERTZ MODEL and The need for ongoing industry and community-led initiatives IJCSCN | February-March 2018 Available online@www.ijcscn.com The modified Gompertz model used by Pitcher assumes that the probable causes for ISSN: 2249-5789 Sandeep Kulkarni, International Journal of Computer Science & Communication Networks,Vol 8(1),1-5 the outbreak of such incidents are imitative as c denotes the net rate of instigation to attacks well as inhibitive in nature This model’s q denotes the rate of inhibition in such attacks Theoretical background is strong and is based on a social conflict theory The imitative aspect is based on incident news spread via the Internet and by word-of-mouth; the inhibitive aspects can also be spread via Internet/Web sites and related stories However, people only engage in Security attacks when they feel threatened or are motivated by some economic or other gain and observed the success of earlier attackers Traditionally, the challenge or threat to such attackers was mostly an intellectual one: to break a system To quote a hacker expert, Of course, other types of challenges come, for instance, from making money or taking economic or political advantage The more successful the earlier attackers are, the more aggressive the behaviour of the present attacker becomes Each such incident is an imitation of previous behaviour and a behavioural model for others to imitate On the other hand, the increase of security activities and success stories about preventing such attacks could reduce the number of attacks Thus, a combination of imitation and inhibition as assumed by the asymmetric model could provide a realistic background in modelling such incidents The model can be expressed as, The parameter Conclusion Many hackers view the Internet as public space for everyone and not see their actions as criminal Hackers are as old as the Internet and many have been instrumental in making the Internet what it is now In my view point hacking and computer crime will be with us for as long as we have the Internet It is our role to keep the balance between what is a crime and what is done for pure enjoyment Luckily, the government is making an effort to control the Internet Yet, true control over the Internet is impossible, because the reasons the Internet was created This is why families and the institution of education of is needed, parents need to let their children know what is okay to on the computer and what is not and to educate them on the repercussions of their actions should they choose to become part of the subculture of hackers As Middle East organizations expand their use of advanced security technology and use the latest hardware and software, it is becoming more difficult to IJCSCN | February-March 2018 Available online@www.ijcscn.com ISSN: 2249-5789 Sandeep Kulkarni, International Journal of Computer Science & Communication Networks,Vol 8(1),1-5 conduct technical attacks organizations are Similarly, the developing well-written mondaq.com/india/x/218890/Social+Media/C yber+De famation+In+Corporate+Word complete security policies and hiring IT Network Security with Cryptography by Prof security experts that are also helping in Mukund R Joshi, Renuka Avinash Karkade , reducing the number of possible attacks 2015 Unfortunately, little is used to secure the Network Security: Hybrid IDPS by Youssef weakest link, i.e the users This is pushing Senhaji and Hicham Medromi , 2015 attackers to gain unauthorized access to Research on Computer Network Virus information by exploiting user’s trust and Defence Technology in Cloud Technology 10 tendency to help Computer Network Security and Attacks on Wireless Sensor Network, Hacking References issues by Sonal R.Jathe, Dipti S Charjan, Malware Self-Protection Technologies by Pallavi A.Patil,2016 Wajeb Gharibil, Abdulrahman Mirza, 2011 11 Research on Improved ECC Algorithm in Software Vulnerabilities, Banking Threats, Network and Information Security Botnets and Technologies Malware by Self-Protection Wajeb Gharibi1, Abdulrahman Mirza ,2011 McAfee Labs, 2012 Threats Predictions 2013, description available at: http://mcaffee.com Indian Express (2012) “Cyber bullying new-age threat“ Indian Express Cyber Crime and Cyber Security: A White Paper for Franchisors, Licensors, and Others by Bruce S Schaeffer, Henfree Chan,Henry Chan and Susan Ogulnick MIT Geospatial Data Centre, 2013 Cyber security and human psychology McAfee Labs, 2013 Threats Predictions 2014, description available at: “India: Cyber http://mcaffee.com Didwania, P (2013) Defamation In Corporate World” available on http:/ / IJCSCN | February-March 2018 Available online@www.ijcscn.com www ... Emergency Response Teams And forming a safer Communication information around the world by improve and maintain the high security of information infrastructures and combating any computer activities... 8(1),1-5 cybercrime The centre support investigation, Prevention of Terrorism Act (URT) building capacity to struggle on cybercrime through working out, awareness educating For fighting Terrorism,... view the Internet as public space for everyone and not see their actions as criminal Hackers are as old as the Internet and many have been instrumental in making the Internet what it is now In my

Ngày đăng: 30/01/2020, 12:40

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN